A Massive Fraud Operation Stole Millions From Online Bank Accounts
IBM researchers claim that they have uncovered a widespread automated fraud operation that leveraged a network of mobile device emulators to stead millions of dollars from targeted bank accounts in just days. The scale of the operation is unprecedented. According to IBM, the cybercriminals behind the campaign used roughly 20
Cyberattacks Discovered on Vaccine Distribution Operations
The IBM cybersecurity division has found that a series of cyberattacks are targeting companies and government organizations pertaining to COVID-19 vaccine development, storage, and distribution. It is unclear whether the attackers are looking to steal technology for keeping vaccines before they are administered or to sabotage the operation. The Department
Microsoft Joins Ban on Sale of Facial Recognition Tech to Police
Microsoft has reportedly joined Amazon and IBM in blocking the sale of its facial recognition technology to law enforcement, pushing for federal laws that adequately address the issues present in the software and regulate the technology. On Thursday, Microsoft stated that the ban on facial recognition gear will stand until
RCE Exploit Released for IBM Data Risk Manager, No Patch Available
IBM has not yet patched four serious security vulnerabilities that lie in the IBM Data Risk Manager (IDRM). The vulnerabilities can lead to unauthenticated remote code execution (RCE), according to an analysis from Agile Information Security. A proof-of-concept exploit is also available for version 2.0.3. IDRM serves as a software
Zeus Sphinx Banking Trojan Arises Amid COVID-19
After three years, the Zeus Sphinx banking trojan has returned to the cybersecurity scene amid the global pandemic, aiming to capitalize on government relief efforts. According to two researchers at IBM X-Force, Amir Gandler and Limor Kessem, the trojan began resurfacing in December, however, there has been a significant increase
Coronavirus-themed spam surged 14,000% in two weeks says IBM
Recently, there have been numerous reports of cybercriminals and hacking groups taking advantage of the COVID-19 pandemic. IBM emerged with new information that stated that in the past two weeks, coronavirus themed spam has increased by 14,000%. The report by IBM’s X-Force reveals how much spam has been generated, taking
Iran Has Launched ‘Malicious’ New Malware That Wipes Windows Computers, Warns IBM
IBM found that state-sponsored hacking group APT34 has deployed a new strain of malicious malware aimed at the industrial and energy sectors in the Middle East. APT34 was responsible for a phishing attack using LinkedIn earlier this year, but IBM claims that they are working with another group whose identity

The Executive’s Guide To Quantum Computing: What you need to know for your strategy today
This guide captures key concepts and the status of major quantum computing research initiatives in a way meant to serve the needs of operational decision-makers. Our goal, inform you about the near future so you can make the right changes to your strategy today. After a review of some key quantum computing concepts we will provide an update on some of the most promising research initiatives and key use cases being explored. We then conclude with insights you can use for your strategic approach and a list of resources for further research.
These Companies Are Pitching AI to the U.S. Military
“While Silicon Valley workers continue to protest their employers selling artificial intelligence products to the U.S. military, the U.S. military is still looking to spend money on AI. The Army Research Lab, the Project Maven team, and the Defense Department’s Joint Artificial Intelligence Center will host technology companies later this month in
Bidding Begins for Pentagon’s Controversial $10 Billion War Cloud
The DoD is now accepting proposals for its 10-year, $10 billion Joint Enterprise Defense Infrastructure (JEDI) cloud contract, to be awarded to a single provider. The controversial contract will make a commercial company responsible for important workloads and classified military secrets accessible around the globe “in a single war cloud.”